End of Geography

With respect to traditional TDM technology, security issues such as toll fraud, intrusion of services and eavesdropping are about point of presence. To listen in on someone’s telephone line, the malicious person needs to be physically located beside the line.

Now comes Voice over Internet Protocol. Internet protocol is an “open” system. If someone knows your IP address, they can get to it. Similarly, if someone knows the path you are taking, maybe they can get in the middle of the path. This holds true for both public traffic as well as private traffic, independently. No longer does someone need to be physically beside the equipment to tamper or breach the security of the equipment. Security breaches can come from anywhere, private or public networks.

To minimize the threat, one can enable VoIP security and routing policies on their IP network using an SBC—which will provide a Network Address Translation (NAT) firewall along with Intrusion Defense Systems (IDS) or Intrusion Prevention Systems (IPS).

Download this printable PDF Cheat Sheet for your reference on the powerful capabilities and features of the Session Border Controller.
Download Cheat Sheet

SBC – The Critical Component:

This whitepaper presents the critical features an SBC delivers to a VoIP/UC enabled network.